共 50 条
- [1] Security analysis of two lightweight RFID authentication protocols [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
- [2] Security analysis of two lightweight RFID authentication protocols [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
- [3] On The Performance Bound of Structured Key-Based RFID Authentication [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2019,
- [4] SKIA-SH: A Symmetric Key-Based Improved Lightweight Authentication Scheme for Smart Homes [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
- [6] Security analysis of two ultra-lightweight RFID authentication protocols [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
- [7] On the Security of RFID Authentication Protocols [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
- [8] The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020
- [9] A Lightweight RFID Authentication Protocol using Step by step Symmetric Key Change [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 853 - 854
- [10] Security of lightweight mutual authentication protocols [J]. The Journal of Supercomputing, 2021, 77 : 4565 - 4581